Software-based energy savings
Tweaking the right controls lets users fight power hogs on laptops and desktops. Some tips are fairly easy to implement, but for others, you will need to delve more deeply into your system settings. In all cases, the reward for your work will be vastly improved battery life on notebooks and power savings in the long run.
Laptop Mode Tools
Configuration file: /etc/laptop-mode/laptop-mode.conf
Activity monitor: /proc/sys/vm/laptop-mode (1 = aktiv)
The Laptop Mode Tools are disabled by default on Ubuntu. To enable, change the value false in the ENABLE_LAPTOP_MODE=false line of the /etc/default/acpi-support file to true. The Powersave daemon provides functionality similar to the Laptop Mode tools on openSUSE.
Display Power Management Signaling is a method of using the graphics card to trigger monitor power state changes with three energy-saving states: Standby, Suspend, and Power off. Both devices need to support this approach.
Sleep or idle states for ACPI-capable processors. Five levels range from C0 to C4. The higher the number, the less power the CPU uses.
- KThinkBat: http://lepetitfou.dyndns.org/projects/kthinkbat
- PowerTOP: http://linuxpowertop.org
- PowerTOP tips and tricks: http://www.lesswatts.org/projects/powertop/known.php
- Mount options: http://www.lesswatts.org/tips/disks.php
- Laptop Mode tools: http://samwel.tk/laptop_mode/
- Desktop PC hard disks: http://samwel.tk/laptop_mode/faq
Buy this article as PDF
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm